A technician is configuring a wireless guest network. After applying the most recent changes the technician finds the new devices can no longer find the wireless network by name but existing devices are still able to use the wireless network.
Which of the following security measures did the technician MOST likely implement to cause this Scenario?
A . Deactivation of SSID broadcast
B . Reduction of WAP signal output power
C . Activation of 802.1X with RADIUS
D . Implementation of MAC filtering
E . Beacon interval was decreased